[crypto] [noreply at crypto.cs.stonybrook.edu: 2012 NDSS: Extended Deadlines and Four Amazing Speakers (David Brin - New York Times Bestselling Author, Eric Grosse - Google SD, Stephen Schmidt - CISO Amazon AWS, John N. Stewart - Cisco CSO&VP)]

R. Hirschfeld ray at unipay.nl
Wed Aug 3 14:17:57 CEST 2011


------- Start of forwarded message -------
From: Conference Mailer <noreply at crypto.cs.stonybrook.edu>
Date: Tue, 02 Aug 2011 19:47:09 -0400
Subject: 2012 NDSS: Extended Deadlines and Four Amazing Speakers (David
 Brin - New York Times Bestselling Author, Eric Grosse - Google SD, Stephen
 Schmidt - CISO Amazon AWS, John N. Stewart - Cisco CSO&VP)


Dear Colleagues, many of you have asked for a deadline extension 
due to conflicts with USENIX etc.  So here goes.  Deadlines have 
been extended by 1 week to Aug 16/23.

---

2012 Network and Distributed System Security Symposium

February 5-8, 2012
Hilton San Diego Resort & Spa
San Diego, California

http://www.isoc.org/isoc/conferences/ndss/12/

Call for Papers

The Network and Distributed System Security Symposium fosters
information exchange among research scientists and practitioners of
network and distributed system security. The target audience includes
those interested in practical aspects of network and distributed
system security, with a focus on system design and implementation. A
major goal is to encourage and enable the Internet community to
apply, deploy, and advance the state of available security
technology. The proceedings are published by the Internet Society
(ISOC).

SPEAKERS 

We are happy to continue the tradition of highly distinguished and fun
speakers. The four distinguished speakers this year are as follows.

+ David Brin, PhD, American scientist and award-winning sci-fi author 
+ Eric Grosse, Google Security Director 
+ Stephen Schmidt, Chief Information Security Officer, Amazon AWS 
+ John N. Stewart, Vice President and Chief Security Officer, Cisco

--------------------------------------------------------------------------
David Brin, PhD, American scientist and award-winning sci-fi author ------

David Brin is a scientist, inventor, and New York Times bestselling
author.  With books translated into 25 languages, he has won multiple
Hugo, Nebula, and other awards.  A film directed by Kevin Costner was
based on David's novel The Postman.  Other works have been optioned
by Paramount and Warner Bros.  One of them - Kiln People - has been
called a book of ideas disguised as a fast-moving and fun noir
detective story, set in a vividly original future; while a hardcover
graphic novel - The Life Eaters - explored alternate outcomes to
World War II.  David's science-fictional Uplift Universe explores a
future when humans genetically engineer higher animals, like
dolphins, to speak.

As a "scientist/futurist", David is seen frequently on television
shows such as The ArchiTechs, Universe, and Life After People (the
most popular show ever, on the History Channel) - along with many
appearances on PBS and NPR.  He is also much in-demand to speak about
future trends, keynoting for IBM, Google, Procter & Gamble, SAP,
Microsoft, Qualcomm, the Mauldin Group, and Casey Research, all the
way to think tanks, Homeland Security, and the CIA.

With degrees from Caltech and the University of California-San Diego,
David serves on advisory panels ranging from astronomy, space
exploration, nanotech, and SETI to national defense and technological
ethics.  His nonfiction book The Transparent Society explores the
dangers of secrecy and loss of privacy in our modern world.  It
garnered the prestigious Freedom of Speech Prize from the American
Library Association.

---------------------------------------------------------------------
Eric Grosse, Google Security Director -------------------------------

Eric Grosse is currently an Engineering Director at Google in
Mountain View CA, working to ensure systems and data stay safe and
users' privacy remains secure.

Before retiring from Alcatel-Lucent's Bell Laboratories in Murray
Hill NJ, Eric was a Director and Fellow, where he founded an internal
venture, CloudControl, that offered enterprise security officers a
unique opportunity to quickly install up to a million address filters
in carrier networks to block or rate-limit unwanted traffic hitting
their enterprise from the Internet, based on automated analysis of
web server and other logs.

He applied encrypted key exchange to build an incrementally and
quietly deployable single-sign on solution, called Factotum, that
stores credentials in the network and improves the security even of
legacy authentication protocols, all without requiring new central or
federated trust relationships. This was part of a redesign of
security in the Plan 9 operating system, which was well received at
the USENIX Security conference.

In an earlier security project, he supervised the team that built the
prototype Lucent Managed Firewall, designed to be used like
watertight compartment doors throughout an enterprise or provider
with delegated control but central supervision. He also collaborated
on a VPN appliance that separates security administration from PC
administration. He built a smartcard based system for Lucent
licensing applications.

He co-founded and continues to help run the Netlib repository of
mathematical software, widely used by the scientific computing
community. The systems issues involved in scaling that up were
intriguing and led him to his current focus on security from his
earlier work on numerical analysis.

Algorithms for approximation and visualization, especially ones
driven by problems from semiconductor design and fabrication, were
the main theme of his first years at Bell Labs. Powerful tools like
splines enabled rapid addition of new transistor designs into circuit
simulators that had previously used ad hoc, labor intensive
semi-analytic models. This was a challenge because of the multiple
variables, the need to preserve monotonicity, and the continuity and
performance requirements. In combination with numerical optimization,
some of these spline techniques allow unique nondestructive
measurement of heterostructure lasers. Other multivariate
approximation innovations include: isosurface-aligned grids, critical
to more accurate silicon energy band models for Boltzman transport;
multivariate generalization of the lowest moving least squares
algorithm, widely used in the statistical community for smoothing
scattered data; first proof of non-obtuse, no-small-angle
triangulation of polygons, a result that launched a flurry of
additional work on the outside leading to some of today's best grid
generators.

He majored in mathematics as an undergraduate, then earned a PhD in
Computer Science at Stanford University under Gene Golub with a
thesis on tensor splines. He has served on the editorial boards of
ACM Trans. Math. Software, IEEE Computational Science & Engineering,
Netlib/NHSE, Numerical Algorithms, SIAM Journal on Scientific
Computing, SIAM News, SIAM Software Environments and Tools, SIAM
Electronic Publishing and the SIAM Council and Board of Trustees.

---------------------------------------------------------------------
Stephen Schmidt, Chief Information Security Officer, Amazon AWS -----

Stephen Schmidt is Chief Information Security Officer for Amazon Web
Services (AWS).  His duties at AWS include leading security-centric
product design, management, and engineering development.  In
addition, Mr.  Schmidt is the executive responsible for AWS.s
standards-based security compliance. 

Prior to joining AWS, Mr.  Schmidt had an extensive career at the
Federal Bureau of Investigation, where he served as a senior
executive.  His responsibilities at the FBI included a term as acting
Chief Technology Officer, Section Chief responsible for the FBI.s
technical collection and analysis platforms, and as a Section Chief
overseeing the FBI.s Cyber Division components responsible for the
technical analysis of computer and network intrusion activities.  His
Cyber Division oversight included areas of malicious code analysis,
computer exploitation tool reverse-engineering, and technical
analysis of computer intrusions.

Mr.  Schmidt has an undergraduate degree in Economics with a
concentration in Computer Science, and a Juris Doctorate.  He is
admitted to practice law in Illinois and Federal Courts.

---------------------------------------------------------------------
John N. Stewart -----------------------------------------------------
Vice President and Chief Security Officer, Cisco Systems, Inc. ------

Throughout his career spanning more than two decades, John Stewart
has led or participated in security efforts ranging from elementary
school IT design to national security programs. A heavily sought
public and closed-door speaker, blogger to blogs.cisco.com/security,
and 2010 Federal 100 Award recipient, Stewarts' drive is simple:
results.

As Vice President and Chief Security Officer for Cisco, Stewart leads
the security operations, product security, and government security
functions. His team focuses on global information security consulting
and services, security evaluation, critical infrastructure assurance,
source code security, identification management, and special programs
that promote Cisco, Internet, national, and global security. He is
also responsible for overseeing security for Cisco.com, the
infrastructure supporting Cisco's $40+ billion business, WebEX, the
collaboration service providing 73 million online meetings per year,
among other Cisco functions.

Stewart is an active member in the broad security industry.
Currently, he sits on technical advisory boards for Core Security
Technologies, Panorama Capital, and RedSeal Networks; is on the board
of directors for KoolSpan, Fixmo, and the National Cyber-Forensics
Training Alliance (NCFTA); is a member of the Cyber Security Think
Tank at University of Maryland University College (UMUC); and is a
standing member of the CSIS Commission on Cyber Security. In the
past, he served on advisory boards for successful companies such as
Akonix, Cloudshield, Finjan, Ingrian Networks, Riverhead, and
TripWire.

Stewart holds a Master of Science degree in computer and information
science with honors from Syracuse University, Syracuse, New York.

Mr. Stewart's publications and recent speaking engagements include:

    Author, Securing Cisco Routers Step by Step
    Co-author, Internet WWW Security FAQ, online at the W3C
    Security Innovation Network IT Security Entrepreneur's Forum
    2011, Stanford, CA
    Montgomery Technology Conference 2011, Santa Monica, CA
    RSA Conference 2011, San Francisco, CA
    FloCon 2011, Salt Lake City, UT
    ADP Global Security Summit, Morristown, NJ
    Oracle CSO Summit 2010, Toronto, Canada
    Interpol Information Security Conference 2010, Hong Kong, China
    NATO Information Assurance Symposium 2010, Brussels, Belgium


---------------------------------------------------------------------

SUBMISSIONS

Technical full and ***short*** papers and panel proposals are
solicited.  Technical papers must not substantially overlap with
material published at or simultaneously submitted to a venue with
proceedings.  Double-submission will result in immediate rejection. 
Reviewing of technical papers is double-blind, and they should be
properly anonymized to conceal the authors' identity.  ***All***
technical papers should be at most 15 pages (11-point font, single
column, 1-inch margins, US letter or A4) excluding the bibliography
and well-marked appendices, and at most 20 pages total.  Papers
accepted as short will be limited to 10 pages total (8 + 2
bibliography) in the proceedings.  Papers should be intelligible
without appendices.  Panel proposals should be one page and must
identify the panel chair, explain the topic and format, and list
potential panelists.  A panel description will appear in the
proceedings, and may include written position statements from
panelists.

Overall, we are looking not only for solid results but also for
crazy out of the box ideas.  Areas of interest include (but are not
limited to):

+ Network perimeter controls: firewalls, packet filters, gateways
+ Network protocol security: routing, naming, network management
+ Cloud computing security
+ Security issues in Future Internet architecture and design
+ Security of web-based applications and services
+ Anti-malware techniques: detection, analysis, and prevention
+ Secure future home networks, Internet of Things, body-area networks
+ Intrusion prevention, detection, and response
+ Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
+ Privacy and anonymity technologies
+ Security for wireless, mobile networks
+ Security of personal communication systems
+ Vehicular Ad-hoc Network (VANETs) Security
+ Security of peer-to-peer and overlay network systems
+ Electronic commerce security: e.g., payments, notarization, timestamping.
+ Network security policies: implementation deployment, management
+ Intellectual property protection: protocols, implementations, DRM
+ Public key infrastructures, key management, certification, and revocation
+ Security for Emerging Technologies
+ Special problems and case studies: cost, usability, security vs. efficiency
+ Collaborative applications: teleconferencing and video-conferencing
+ Smart Grid Security
+ Secure Electronic Voting
+ Security of large-scale critical infrastructures
+ Trustworthy Computing for network protocols and distributed systems
+ Network and distributed systems forensics

DATES

Abstracts: August 16, 2011 (11:59 pm ET) (extended from Aug 9)
Papers: August 23, 2011 (11:59 pm ET)    (extended from Aug 16)
Notification: October 23, 2011
Camera-ready: December 2, 2011
Conference: February 5-8, 2012

PROGRAM COMMITTEE

Ross Anderson, University of Cambridge
Davide Balzarotti, EURECOM Sophia Antipolis
Lujo Bauer, Carnegie Mellon
Kosta Beznosov, University of British Columbia
Matt Bishop, UC Davis
Nikita Borisov, UIUC
Elie Bursztein, Stanford University
Christian Cachin, IBM Research Zurich
Bogdan Carbunar, Motorola Labs
Jeff Chase, Duke University
Yan Chen, Northwestern University
Landon Cox, Duke University
Marc Dacier, Symantec Research Labs
George Danezis, Microsoft Research
Sven Dietrich, Stevens Institute of Technology
Dave Evans, University of Virginia
Nick Feamster, Georgia Tech
Michael Freedman, Princeton University
Carrie Gates, CA Technologies
Russ Housley, Internet Engineering Task Force
Xuxian Jiang, North Carolina State University
Rob Johnson, Stony Brook University
Ari Juels, RSA Labs
Stefan Katzenbeisser, TU Darmstadt
Angelos Keromytis, Columbia University
Yongdae Kim, University of Minnesota
Wenke Lee, Georgia Tech
Brian Levine, UMASS Amherst
Morley Mao, University of Michigan
Patrick McDaniel, Penn State University
John Mitchell, Stanford University
David Molnar, Microsoft Research
Peng Ning, North Carolina State University
Cristina Nita-Rotaru, Purdue University
Bryan Parno, Microsoft Research
Vern Paxson, UC Berkeley / ICSI
Giuseppe Persiano, Universita di Salerno
Michael Reiter, UNC at Chapel Hill
Volker Roth, Freie Universitaet Berlin
Radu Sion, Stony Brook University (chair)
Ahmad-Reza Sadeghi, Fraunhofer Institute 
Nitesh Saxena, NYU Poly
R. Sekar, Stony Brook University
Elaine Shi, UC Berkeley and Parc 
Vitaly Shmatikov, University of Texas at Austin
Alex Snoeren, UC San Diego
Robin Sommer, ICSI
Paul Syverson, Naval Research Laboratory
Doug Szaida, University of Richmond
Wade Trappe, Rutgers University
Arun Venkataramani, UMASS Amherst
Dan Wallach, Rice University
Cliff Wang, US Army Research Office
Nick Weaver, ICSI
Peter Williams, Stony Brook University
Dongyan Xu, Purdue University
Moti Yung, Google Inc.

---

We appologize if you receive multiple copies of this (we have made
every effort to avoid this).  If you would like to not receive
further emails from us please do not hesitate to email
sion at cs.stonybrook.edu and we will promptly remove your address.
------- End of forwarded message -------


More information about the crypto mailing list